Skip to main content
Log in

Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption

  • Foundations
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Attributed-based encryption (ABE) is a promising cryptographic access control mechanism with a rich expressiveness of ABE policies. Due to the high complexities of encryption and decryption, users are burdened with large computation cost. Fortunately, outsourcing technologies can be used to reduce the computation overhead for the ABE schemes. In the recent decade, the achievements of the outsourced ciphertext-policy ABE (CP-ABE) schemes are inspiring. But, the outsourcing encryption algorithms for CP-ABE schemes are not addressed properly since the encryption exponents are dynamic. In this paper, we present an efficient outsourced CP-ABE scheme with checkability, where the number of the exponential operations in the encryption can be reduced to a constant by introducing a blinding algorithm. Meanwhile, the ciphertext size is not increased. Furthermore, to guarantee the correctness of our scheme, we provide the verification mechanism based on a collision-resistance hash function, which allows the users to efficiently check the validity of messages and outsourced computation results. Besides, the proposed scheme is secure against replayable chosen ciphertext attacks based on Green’s outsourcing security model. Intensive experiments are carried out to illustrate the efficiency of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. The function f is just defined based on a given hash function. If the pair of plaintext–ciphertext \((m,C_{1})\) satisfies the verification equation \(c_{12}=\hbox {hash}(c_{11},m,pk)\), where \(C_{1}=(c_{11},c_{12})\). Then \(f(\textit{PK},C_{1},m)=1\)

References

  • Beimel A (1996) Secure schemes for secret sharing and key distribution. Israel Institute of Technology, Technion, Haifa

    Google Scholar 

  • Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy (SP ’07). IEEE, pp 321–334

  • Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: a practically motivated enhancement to attribute-based encryption. In: European symposium on research in computer security. Springer, Berlin, pp 587–604

  • Fu Z, Sun X, Li Q et al (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200

    Article  Google Scholar 

  • Goyal V, Jain A, Pandey O et al (2008) Bounded ciphertext policy attribute based encryption. In: International colloquium on automata, languages, and programming. Springer, Berlin, pp 579–591

  • Goyal V, Pandey O, Sahai A et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98

  • Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. In: USENIX security symposium, vol 2011

  • He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J. doi:10.1109/JSYST.2015.2428620

  • He D, Zeadally S, Kumar N, Lee JH (2016a) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J. doi:10.1109/JSYST.2016.2544805

  • He D, Kumar N, Wang H et al (2016b) A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans Dependable Secur Comput. doi:10.1109/TDSC.2016.2596286

  • Huang X, Li J, Li J et al (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  • Ibraimi L, Tang Q, Hartel P et al (2009) Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In: International conference on information security practice and experience. Springer, Berlin, pp 1–12

  • Islam SH, Khan MK (2014) Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J Med Syst 38(10):1–16

    Article  Google Scholar 

  • Khan MK (2009) Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world. IETE Tech Rev 26(3):191–195

    Article  Google Scholar 

  • Lai J, Deng R H, Yang Y et al (2013) Adaptable ciphertext-policy attribute-based encryption. In: International conference on pairing-based cryptography. Springer, Berlin, pp 199–214

  • Lewko A, Sahai A, Waters B (2010) Revocation systems with very small private keys. In: IEEE symposium on security and privacy. IEEE, pp 273–285

  • Li J, Jia C, Li J et al (2012) Outsourcing encryption of attribute-based encryption with mapreduce. In: International conference on information and communications security. Springer, Berlin, pp 191–201

  • Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95

    Article  Google Scholar 

  • Li X, Niu J, Wang Z, Chen C (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488–1497

  • Li X, Niu J, Liao J, Liang W (2015) Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst 28(2):374–82

    Article  Google Scholar 

  • Li X, Li J, Huang F (2016) A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Comput 20(4):1437C1448

    Google Scholar 

  • Lin S, Zhang R, Ma H, Wang S (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(10):2119–2130

    Article  Google Scholar 

  • Liu Z, Weng J, Li J, Yang L et al (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243–3255

    Article  Google Scholar 

  • Ma J, Lai J, Deng R H, Ding X (2016) Adaptable key-policy attribute-based encryption with time interval. Soft Comput. doi:10.1007/s00500-016-2177-z

  • Mao X, Lai J, Mei Q, Chen K (2015) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Dependable Secure Comput 13(5):533–546

  • Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 195–203

  • Qin B, Deng RH, Liu S et al (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(7):1384–1393

    Article  Google Scholar 

  • Ren YJ, Shen J, Wang J et al (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323

    Google Scholar 

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 457–473

  • Shen J, Tan H, Moh S et al (2015) Enhanced secure sensor association and key management in wireless body area networks. J Commun Netw 17(5):453–462

    Article  Google Scholar 

  • Siddiqui Z, Abdullah AH, Khan MK et al (2014) Smart environment as a service: three factor cloud based user authentication for telecare medical information system. J Med Syst 38(1):1–14

    Article  Google Scholar 

  • Wang H, He D, Shen J et al (2016) Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. doi:10.1007/s00500-016-2271-2

  • Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: International workshop on public key cryptography. Springer, Berlin, pp 53–70

  • Xhafa F, Wang J, Chen X et al (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802

    Article  Google Scholar 

  • Xia Z, Wang X, Zhang L et al (2016a) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608

    Article  Google Scholar 

  • Xia Z, Wang X, Sun X et al (2016b) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352

    Article  Google Scholar 

  • Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. In: Proceedings of the 8th international conference on network and service management. International Federation for Information Processing, pp 37–45

Download references

Acknowledgements

This study was funded by the National Natural Science Foundation of China (NSFC) (Nos. 61300220, 61370194, 61411146001, 61501333, 61572379), and the Scientific Research Fund of Hunan Provincial Education Department under Grant No. 16B089.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiong Li.

Ethics declarations

Conflict of interest

The authors declare that there are no conflicts of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by A. Di Nola.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, J., Li, X., Wang, L. et al. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput 22, 707–714 (2018). https://doi.org/10.1007/s00500-017-2482-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-017-2482-1

Keywords

Navigation